Analysis
-
max time kernel
143s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
27/03/2025, 20:12
Static task
static1
Behavioral task
behavioral1
Sample
b1b3a3b2ff01c33585d2fa3eadd78741af5b421e7463450e348401be175f0a31.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b1b3a3b2ff01c33585d2fa3eadd78741af5b421e7463450e348401be175f0a31.exe
Resource
win10v2004-20250314-en
General
-
Target
b1b3a3b2ff01c33585d2fa3eadd78741af5b421e7463450e348401be175f0a31.exe
-
Size
312KB
-
MD5
2496c32182f058193c695bf5a21d6ced
-
SHA1
8c4cd680dcfcd6a798d035351c26217098b5f9fd
-
SHA256
b1b3a3b2ff01c33585d2fa3eadd78741af5b421e7463450e348401be175f0a31
-
SHA512
098f5866a222a71239886afcbcfa092d69bc04bfd33eb0a55d8a64b574dbb7296fcfae61d680285bb19b5f16a29b7c0efe99496658e2cde7937ec8822e5c49a0
-
SSDEEP
6144:Kp5mfHHx9QFeYj/jzT+Nbbeoq2aIcEo/hLrBRfQ+8sCVKZubm8J9R7x6uQoErG:OqnxqEYj/fkaoq2aIcEwhL9Rr8sCVGG3
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "\"C:\\Users\\Admin\\AppData\\Roaming\\qMh3ao2yIbA47mag\\EwbMKouwZTxu.exe\",explorer.exe" b1b3a3b2ff01c33585d2fa3eadd78741af5b421e7463450e348401be175f0a31.exe Set value (str) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "\"C:\\Users\\Admin\\AppData\\Roaming\\qMh3ao2yIbA47mag\\mSW0EDG2ryLD.exe\" \"C:\\Users\\Admin\\AppData\\Roaming\\qMh3ao2yIbA47mag\\EwbMKouwZTxu.exe\",explorer.exe" images.exe Set value (str) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "\"C:\\Users\\Admin\\AppData\\Roaming\\qMh3ao2yIbA47mag\\HFZKfX8JAVHz.exe\" \"C:\\Users\\Admin\\AppData\\Roaming\\qMh3ao2yIbA47mag\\mSW0EDG2ryLD.exe\" \"C:\\Users\\Admin\\AppData\\Roaming\\qMh3ao2yIbA47mag\\EwbMKouwZTxu.exe\",explorer.exe" images.exe -
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzonerat family
-
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\programs.bat b1b3a3b2ff01c33585d2fa3eadd78741af5b421e7463450e348401be175f0a31.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\programs.bat:start b1b3a3b2ff01c33585d2fa3eadd78741af5b421e7463450e348401be175f0a31.exe -
Executes dropped EXE 2 IoCs
pid Process 1056 images.exe 4936 images.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Images = "C:\\ProgramData\\images.exe" b1b3a3b2ff01c33585d2fa3eadd78741af5b421e7463450e348401be175f0a31.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b1b3a3b2ff01c33585d2fa3eadd78741af5b421e7463450e348401be175f0a31.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language images.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language images.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
NTFS ADS 1 IoCs
description ioc Process File created C:\ProgramData:ApplicationData b1b3a3b2ff01c33585d2fa3eadd78741af5b421e7463450e348401be175f0a31.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 464 b1b3a3b2ff01c33585d2fa3eadd78741af5b421e7463450e348401be175f0a31.exe Token: SeDebugPrivilege 464 b1b3a3b2ff01c33585d2fa3eadd78741af5b421e7463450e348401be175f0a31.exe Token: SeDebugPrivilege 1056 images.exe Token: SeDebugPrivilege 1056 images.exe Token: SeDebugPrivilege 4936 images.exe Token: SeDebugPrivilege 4936 images.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 464 wrote to memory of 1056 464 b1b3a3b2ff01c33585d2fa3eadd78741af5b421e7463450e348401be175f0a31.exe 89 PID 464 wrote to memory of 1056 464 b1b3a3b2ff01c33585d2fa3eadd78741af5b421e7463450e348401be175f0a31.exe 89 PID 464 wrote to memory of 1056 464 b1b3a3b2ff01c33585d2fa3eadd78741af5b421e7463450e348401be175f0a31.exe 89 PID 400 wrote to memory of 4936 400 cmd.exe 91 PID 400 wrote to memory of 4936 400 cmd.exe 91 PID 400 wrote to memory of 4936 400 cmd.exe 91 PID 1056 wrote to memory of 4868 1056 images.exe 96 PID 1056 wrote to memory of 4868 1056 images.exe 96 PID 1056 wrote to memory of 4868 1056 images.exe 96 PID 1056 wrote to memory of 4868 1056 images.exe 96 PID 1056 wrote to memory of 4868 1056 images.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\b1b3a3b2ff01c33585d2fa3eadd78741af5b421e7463450e348401be175f0a31.exe"C:\Users\Admin\AppData\Local\Temp\b1b3a3b2ff01c33585d2fa3eadd78741af5b421e7463450e348401be175f0a31.exe"1⤵
- Modifies WinLogon for persistence
- Drops startup file
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:464 -
C:\ProgramData\images.exe"C:\ProgramData\images.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1056 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe"3⤵
- System Location Discovery: System Language Discovery
PID:4868
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\ProgramData\images.exe1⤵
- Suspicious use of WriteProcessMemory
PID:400 -
C:\ProgramData\images.exeC:\ProgramData\images.exe2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4936
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
312KB
MD52496c32182f058193c695bf5a21d6ced
SHA18c4cd680dcfcd6a798d035351c26217098b5f9fd
SHA256b1b3a3b2ff01c33585d2fa3eadd78741af5b421e7463450e348401be175f0a31
SHA512098f5866a222a71239886afcbcfa092d69bc04bfd33eb0a55d8a64b574dbb7296fcfae61d680285bb19b5f16a29b7c0efe99496658e2cde7937ec8822e5c49a0